Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887
banner image
image of Volume 5, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 5, Issue 3, September 2011


Volume 5, Issue 3

September 2011

Show / Hide details
    • Impossible differential cryptanalysis of reduced–round Camellia–256
      Approach to security assessment of critical infrastructures’ information systems
      Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
      Non-XOR approach for low-cost bit-parallel polynomial basis multiplier over GF(2m)
      Secure extension to the optimised link state routing protocol
      Step-projection-based spread transform dither modulation

Most viewed content for this Journal

Article
content/journals/iet-ifs
Journal
5
Loading

Most cited content for this Journal

This is a required field
Please enter a valid email address